CVE-2025-36026

4.3 MEDIUM

📋 TL;DR

IBM Datacap versions 9.1.7-9.1.9 fail to set the Secure attribute on authorization tokens and session cookies, allowing attackers to intercept these cookies via HTTP links. This affects all users of vulnerable Datacap deployments, potentially exposing session credentials.

💻 Affected Systems

Products:
  • IBM Datacap
Versions: 9.1.7, 9.1.8, 9.1.9
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable unless HTTPS-only access is already enforced.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal valid session cookies, gaining unauthorized access to Datacap applications and sensitive document processing data.

🟠

Likely Case

Session hijacking leading to unauthorized access to document processing workflows and data exfiltration.

🟢

If Mitigated

Limited impact if HTTPS-only access is enforced and network segmentation prevents cookie interception.

🌐 Internet-Facing: HIGH - Internet-facing deployments are vulnerable to cookie interception via malicious HTTP links.
🏢 Internal Only: MEDIUM - Internal networks still risk cookie theft if attackers can plant HTTP links or intercept traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking users into clicking HTTP links or intercepting network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Datacap fix as per vendor advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7238443

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific fix details
2. Apply recommended fix from IBM
3. Restart Datacap services
4. Verify Secure attribute is set on cookies

🔧 Temporary Workarounds

Enforce HTTPS-only access

all

Configure web server to redirect all HTTP traffic to HTTPS and set HSTS headers

# Apache: Redirect HTTP to HTTPS in config
# Nginx: server { listen 80; return 301 https://$host$request_uri; }

Configure cookie security headers

all

Manually set Secure and HttpOnly flags on session cookies via application configuration

# Application-specific configuration required

🧯 If You Can't Patch

  • Enforce HTTPS-only access with HSTS headers
  • Implement network segmentation to prevent cookie interception
  • Monitor for suspicious authentication patterns

🔍 How to Verify

Check if Vulnerable:

Inspect browser developer tools or use curl to check if session cookies lack Secure attribute when accessed via HTTP

Check Version:

Check Datacap version via administrative interface or configuration files

Verify Fix Applied:

Verify cookies have Secure attribute set and cannot be sent over HTTP connections

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from new IP
  • Session cookies transmitted over HTTP in logs

Network Indicators:

  • HTTP traffic containing session cookies
  • Unencrypted authentication traffic

SIEM Query:

search source="web_logs" http_method=GET AND uri CONTAINS "/datacap" AND cookie_header EXISTS

🔗 References

📤 Share & Export